Like many others, the education sector has become a prime target of malicious ransomware attacks resulting in the loss and exposure of highly sensitive student and family data. As gatekeepers of information like medical records, family finances, and personally identifiable information (PII) such as birthdays and social security numbers, educational institutions are faced with the challenge of maintaining security and protecting student and family privacy. In an effort to safeguard this information, regulations such as The Family Educational Rights and Privacy Act (FERPA) have been instituted to provide guidelines for schools and universities to follow. Understanding how to appropriately implement these measures are more important than ever as pervasive threats are on the rise.
What is FERPA?
FERPA is a federal law enacted in 1974 that protects the privacy of student and family education records. Under the law, personal student and family information such as test scores, behavioral reports, and any other personal identifiable information require parental consent (or student consent if the student is over 18) in order to be released. Although FERPA was enacted prior to the widespread use of the internet and digital records, it has evolved to include provisions for data privacy guidance in order to protect student and family information from unauthorized disclosure and modern cyber threats.
FERPA applies to any Institution that receives funding directly from the U.S. Department of Education or from any program the Department administers. All public schools, districts, and many private and postsecondary institutions must adhere to regulation guidelines to report known breaches of data. Additionally, third parties who improperly disclose PII from student records can be prohibited from receiving access to records at the education agency or institution for at least five years.
Enforcing this rule is the Family Policy Compliance Office (FPCO) which investigates violations and has the authority to withdraw federal funding for non compliance. Moreover, states may further penalize institutions. And like those in the private sector, reputational damage can be especially costly.
Best Practices
Given the notoriously tight budgets schools face along with competing demands from various stakeholders, implementing the necessary tools can prove challenging.
Atakama & FERPA Compliance
Throughout the day, administrators, teachers, parents, and agencies routinely share and require access to sensitive data without disruption. While encrypting the data is a best practice, many solutions are difficult to implement and even more so to manage. A multifactor encryption (MFE) solution like Atakama removes these barriers and makes it simple to store and transmit data without the traditional burdens.
Atakama’s MFE solution relies on distributed key management. An ultra effective way to secure data even when other security fails and an adversary has breached the perimeter. Atakama can be quickly deployed, enabling institutions to mature their security and compliance programs more rapidly. Once deployed, institutions will immediately benefit from Atakama’s MFE granular level of security without interference in daily operations.
There are no usernames or passwords or other reliance on user credentials. Instead, each file is protected with its own unique encryption key. Keys are seamlessly and automatically split and distributed to every user who has access to the encrypted files and is enabled with Atakama. The system offers ease of access for those who need to access protected files while retaining security.
Atakama eliminates the gap between security and usability by creating a system that goes where the files are. With Atakama, files can remain stored in the same cloud and on-prem locations already in use. Additionally, when users share files, Atakama relies on the same distributed key architecture to ensure the intended recipient is accessing the file.
Atakama prevents accidental sharing and ensures encryption over data both at-rest and in-transit. Unlike other encryption solutions, Atakama makes it easy for end-users to interact with encrypted data while also continuously enforcing security and privacy controls.